4. Enter the name of the chain to be added.
5.
Click
Save
.
NOTE: Spaces are not allowed in the chain name.
6. Add one or more rules to complete the chain configuration.
To change the policy for a default chain:
NOTE: User-defined chains cannot be edited. To rename a user-added chain, delete it and create a new one.
1.
Select
Network - Firewall
.
2.
Select either
IPv4 Filter Table
or
IPv6 Filter Table
as needed.
3.
Select the checkbox next to the name of the chain you want to change (
FORWARD
,
INPUT
,
OUTPUT
).
4. Click
Change Policy
and select
Accept
or
Drop
from the drop-down menu.
5.
Click
Save
.
To add a rule:
1.
Select
Network - Firewall
.
2.
Select either
IPv4 Filter Table
or
IPv6 Filter Table
as needed.
3.
From the chain list, click the name of the chain you want to add a rule to.
4. Click
Add
and configure the rule as needed, then click
Save
.
To edit a rule:
1.
Select
Network - Firewall
.
2.
Select either
IPv4 Filter Table
or
IPv6 Filter Table
as needed.
3.
From the chain list, click the name of the chain with the rule you want to edit.
4. Select the rule you want to edit and click
Edit
.
5.
Modify the rule as needed and click
Save
.
IPSec(VPN)
Virtual Private Network (VPN) enables a secure communication between the console server and a remote network by
utilizing a gateway and creating a secure connection between the console server and the gateway. The IPSec protocol is
used to construct the secure tunnel and provides encryption and authentication services at the IP level of the protocol stack.
With a console server located on a separate network behind a router, it establishes an IPSec tunnel using a x.509 certificate
to a firewall. Certificates and keys are distributed to the firewall and the console server by a Certificate Authority (CA).
NOTE: The console server supports one certificate per tunnel. Multiple certificates are not supported. IPv6 tunnels
are not supported. Certificates (in PKCS12 format) can be loaded from the System Tools menu.
NOTE: To run IPSec (VPN), you must enable IPSec under the custom security profile.
The remote gateway is referred to as the remote or right host and the console server is referred to as the local or left host.
Creating a Certificate of Authority
To configure the Fortinet® Fortigate firewall, you need to create an internal Certificate of Authority (CA) server that
generates RSA certificates the console server uses for authentication.
For information on creating a CA on an Ubuntu® server, see
Creating a CA
.
Vertiv™ | Avocent® ACS800/8000 Advanced Console Server Installer/User Guide
26